802 Secure was cited in the Gartner report, "OT Security Best Practices", as an OT (Operational Technology) vendor for asset management and security monitoring. “This report is further evidence that our technology provides value to manufacturing, critical...

On October 4, 2018, BBC news https://www.bbc.com/news/world-europe-45747472 reported that an alleged Russian group's efforts to perform a cyber-attack on the Organisation for the Prevention of Chemical Weapons (OPCW) were foiled by Dutch law enforcement....

IoT Adoption

Organizations are adopting Wi-Fi and IoT enabled business processes and technologies that promise great gains in productivity and results. However, organizations lack visibility into the multitude of new IoT operating systems, protocols, and frequencies; leading to a new Critical Path to Exposure™ for adversaries.

Solution

As organizations face these new risks and threats, 802 Secure brings visibility to invisible wireless IoT devices and networks with a solution that requires no network access and zero integration. Within minutes of deployment, wireless and IoT assets are identified and categorized, misconfigurations are enumerated, and rogue devices and attacks are identified; thereby providing actionable results without all of the static of unrelated wireless devices.